AES Encryption with HMAC-SHA2 for Kerberos 5
draft-ietf-kitten-aes-cts-hmac-sha2-06

The information below is for an old version of the document
Document Type Expired Internet-Draft (kitten WG)
Authors Michael Jenkins  , Michael Peck  , Kelley Burgin 
Last updated 2015-08-14 (latest revision 2015-02-10)
Stream Internent Engineering Task Force (IETF)
Formats
Expired & archived
pdf htmlized (tools) htmlized bibtex
Reviews
Stream WG state In WG Last Call
Revised I-D Needed - Issue raised by WGLC
Document shepherd No shepherd assigned
IESG IESG state Expired
Consensus Boilerplate Unknown
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-ietf-kitten-aes-cts-hmac-sha2-06.txt

Abstract

This document specifies two encryption types and two corresponding checksum types for Kerberos 5. The new types use AES in CTS mode (CBC mode with ciphertext stealing) for confidentiality and HMAC with a SHA-2 hash for integrity.

Authors

Michael Jenkins (mjjenki@tycho.ncsc.mil)
Michael Peck (mpeck@mitre.org)
Kelley Burgin (kelley.burgin@gmail.com)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)